Exam 1: Introduction to Information Security
Exam 1: Introduction to Information Security50 Questions
Exam 2: Introduction to Networking50 Questions
Exam 3: Cryptography50 Questions
Exam 4: Firewall Technologies and Administration50 Questions
Exam 5: Network Authentication and Remote Access Using Vpn50 Questions
Exam 6: Network Monitoring and Intrusion Detection and Prevention Systems50 Questions
Exam 7: Wireless Network Security49 Questions
Exam 8: Security of Web Applications50 Questions
Exam 9: Network Vulnerability Assessment49 Questions
Exam 10: Auditing, Monitoring, and Logging50 Questions
Exam 11: Contingency Planning and Networking Incident Response50 Questions
Exam 12: Digital Forensics50 Questions
Select questions type
Match each item with a statement below.
a.Accuracy
f.Data users
b.Authenticity
g.Integrity
c.Availability
h.Utility
d.Confidentiality
i.Data custodians
e.Data owners
-Enables authorized users to access information without interference or obstruction, and to receive it in the required format.
Free
(Short Answer)
4.9/5
(32)
Correct Answer:
C
Organizations must minimize ____ to match their risk appetite.
Free
(Multiple Choice)
4.8/5
(31)
Correct Answer:
C
By balancing information security and access, a completely secure information system can be created.
Free
(True/False)
4.9/5
(39)
Correct Answer:
False
Match each item with a statement below.
a.Accuracy
f.Data users
b.Authenticity
g.Integrity
c.Availability
h.Utility
d.Confidentiality
i.Data custodians
e.Data owners
-People responsible for the security and use of a particular set of information.
(Short Answer)
4.8/5
(27)
Match each item with a statement below.
a.Accuracy
f.Data users
b.Authenticity
g.Integrity
c.Availability
h.Utility
d.Confidentiality
i.Data custodians
e.Data owners
-End users who work with the information to perform their daily jobs supporting the mission of the organization, and who therefore share the responsibility for data security.
(Short Answer)
4.9/5
(41)
A(n) ____ is an application error that occurs when more data is sent to a buffer than it can handle.
(Multiple Choice)
4.8/5
(24)
An enterprise information security policy (EISP) is also known as a(n) ____.
(Multiple Choice)
4.8/5
(35)
Which individual interferes with or disrupts systems to protest the operations, policies, or actions of an organization or government agency?
(Multiple Choice)
4.7/5
(27)
Define social engineering and briefly describe how it is accomplished.
(Essay)
5.0/5
(33)
When organizations record versions of their policy in English and alternate languages, they are attempting to meet the ____ criteria to make the policy effective and legally enforceable.
(Multiple Choice)
4.8/5
(39)
Implementing multiple types of technology and thereby preventing the failure of one system from compromising the security of information is referred to as ____________________.
(Short Answer)
4.8/5
(39)
____________________ is a technique used to gain unauthorized access to computers, wherein the intruder sends messages whose IP addresses indicate to the recipient that the messages are coming from a trusted host.
(Short Answer)
4.9/5
(30)
List the four important organizational functions an information security program performs.
(Essay)
4.9/5
(28)
Which term describes a subject or object's ability to use, manipulate, modify, or affect another subject or object?
(Multiple Choice)
4.9/5
(31)
Match each item with a statement below.
a.Accuracy
f.Data users
b.Authenticity
g.Integrity
c.Availability
h.Utility
d.Confidentiality
i.Data custodians
e.Data owners
-The protection of information from disclosure or exposure to unauthorized individuals or systems.
(Short Answer)
4.8/5
(28)
Match each item with a statement below.
a.Accuracy
f.Data users
b.Authenticity
g.Integrity
c.Availability
h.Utility
d.Confidentiality
i.Data custodians
e.Data owners
-A term meaning information remains whole, complete, and uncorrupted.
(Short Answer)
4.7/5
(42)
How does a distributed denial-of-service (DDoS) attack work and why are they so dangerous?
(Essay)
4.8/5
(34)
Match each item with a statement below.
a.Accuracy
f.Data users
b.Authenticity
g.Integrity
c.Availability
h.Utility
d.Confidentiality
i.Data custodians
e.Data owners
-A term referring to the quality or state of being genuine or original rather than a reproduction or fabrication.
(Short Answer)
4.9/5
(35)
The CIA triad is based on three characteristics of information that form the foundation for many security programs: ____.
(Multiple Choice)
4.8/5
(43)
Describe the purpose of the Security Area Working Group and RFC 2196.
(Essay)
4.9/5
(39)
Showing 1 - 20 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)